HM Note: This hybrid contract role is three (3) days in office. Candidates resume must include first and last name.
Description:
Responsibilities:
Works in partnership with clients advising them on information technology and cybersecurity practices in order to meet their business objectives or overcome problems work to improve structure and efficiency of an organizations I and amp;IT systems. The I and amp;IT Consultant may be used to provide strategic guidance to organizations with regard to Information Management and amp; IT technology CyberSecurity practices and safeguards IT infrastructures and the enablement of major business processes through enhancements to IT. Provides subject matter expertise in their field and highly expert technical assistance.
General Skills:
Acts as the technical advisor/expert on all aspects of a specific deliverable Provide the quality assurance/quality control of specific deliverables
Anticipates and resolves problems to ensure that the deliverables are completed within budget to the highest quality meeting or exceeding expectations
Develops processes and procedures for implementing deliverables
Prepares reports and presentations including options recommendations implementation plans etc.
Works with clients to define the scope of a project and to determine requirements
Defines software hardware and network requirements Analyzes I and amp;IT and security requirements giving independent and objective advice on the use of I and amp;IT
Designs tests installs and monitors new systems and develops solutions and implementation of new systems
Familiar with changemanagement principles and methodology
Knowledge and understanding of Information Management principles concepts policies and practices
Skills
Experience and Skill Set Requirements
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Proficiency in cybersecurityrelated practices including knowledge of safeguards is preferred. Prior experience in this area would be advantageous. and nbsp;
- Experience in planning organizing and implementing security related efforts for large systems
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Knowledge of CyberSecurity and nbsp;principles including threat modeling risk assessment and security controls and Familiarity with common security frameworks such as and nbsp;NIST Cybersecurity Framework and nbsp;ISO 27001 or and nbsp;CIS Controls.
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in Application security and network security and their safeguards
- Knowledge of risk management practices and strategies to mitigate identified risks. This includes ability to assess risks related to sensitive data
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in Security Architecture and design. This includes designing secure systems and network considering and nbsp;factors like access controls encryption and secure communication channels
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Familiarity with Privacy laws and understanding of privacy regulations
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience creating security strategy documentation plans and test scenarios for various types and phases of security testing
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Proficient in Endpoint Network and Cloud related aspects in data leakage prevention
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in understanding data flows both inside and outside the organization
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in facilitating meetings with various stakeholders
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in leading initiatives involving stakeholders across multiple organizations
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience creating reports and documentation and presenting to various stakeholders seeking approval
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience leading a team of security staff and vendors working closely with the project leads
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Knowledge and experience in the use of securityrelated tools and frameworks
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience working in an agile environment
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Knowledge of cloud native applications
and nbsp;
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Musthaves:
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in planning organizing and implementing security related efforts for large systems
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Knowledge of CyberSecurity and nbsp;principles including threat modeling risk assessment and security controls and Familiarity with common security Experience in Application security and network security and their safeguards
- Knowledge of risk management practices and strategies to mitigate identified risks. This includes ability to assess risks related to sensitive data
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in Security Architecture and design. This includes designing secure systems and network considering and nbsp;factors like access controls encryption and secure communication channels
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Familiarity with Privacy laws and understanding of privacy regulations
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Proficient in Endpoint Network and Cloud related aspects in data leakage prevention
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in understanding data flows both inside and outside the organization
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in facilitating meetings with various stakeholders
and nbsp; and nbsp;
Weightage: 50
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in planning organizing and implementing security related efforts for large systems
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Knowledge of CyberSecurity and nbsp;principles including threat modeling risk assessment and security controls and Familiarity with common security Experience in Application security and network security and their safeguards
- Knowledge of risk management practices and strategies to mitigate identified risks. This includes ability to assess risks related to sensitive data
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in Security Architecture and design. This includes designing secure systems and network considering factors like access controls encryption and secure communication channels
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Knowledge and experience in the use of securityrelated tools and frameworks
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in leading initiatives involving stakeholders across multiple organizations
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Familiarity with Privacy laws and understanding of privacy regulations
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Proficient in Endpoint Network and Cloud related aspects in data leakage prevention
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in understanding data flows both inside and outside the organization
Weightage: 30
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience creating security strategy documentation plans and test scenarios for various types and phases of security testing
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in facilitating meetings with various stakeholders
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience creating reports and documentation and presenting to various stakeholders seeking approval
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience leading a team of security staff and vendors working closely with the project leads
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Knowledge and experience in the use of securityrelated tools and frameworks
and nbsp;
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Weightage: 20
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience working in an agile environment
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Knowledge of cloud native applications
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Understand the security landscape of vulnerable sectors
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in vendor management while balancing organization needs with vendor interests and nbsp;
Musthaves:
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in planning organizing and implementing security related efforts for large systems
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Knowledge of CyberSecurity and nbsp;principles including threat modeling risk assessment and security controls and Familiarity with common security Experience in Application security and network security and their safeguards
Knowledge of risk management practices and strategies to mitigate identified risks. This includes ability to assess risks related to sensitive data
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in Security Architecture and design. This includes designing secure systems and network considering and nbsp;factors like access controls encryption and secure communication channels
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Familiarity with Privacy laws and understanding of privacy regulations
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Proficient in Endpoint Network and Cloud related aspects in data leakage prevention
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in understanding data flows both inside and outside the organization
and nbsp; and nbsp; and nbsp; and nbsp; and nbsp; and nbsp;Experience in facilitating meetings with various stakeholders